General

  • Target

    Omega Gen By elfidelitop.exe

  • Size

    5.9MB

  • Sample

    241209-x9n9taykhz

  • MD5

    2eefe54618a3a52010ae974e93f1ea1c

  • SHA1

    473d3f680e2f8e9e0795cdeea7f9688993eb4021

  • SHA256

    a73bab6855e00d0624499d2254e92e737f6078ffe341608f5adc35795f10725c

  • SHA512

    c31fb2067ddeff6ecd4464a4e788889502a50b581fa053072354e1218fb84734f492ecd7b379ebf0e2a52eccea39234bdf3dd17d6e4125abc696e91e57cc05ff

  • SSDEEP

    98304:VR+nh2Yi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFF9hakrJ/U6V/:VsnLDOYjJlpZstQoS9Hf12VKXqbaCxV/

Malware Config

Targets

    • Target

      Omega Gen By elfidelitop.exe

    • Size

      5.9MB

    • MD5

      2eefe54618a3a52010ae974e93f1ea1c

    • SHA1

      473d3f680e2f8e9e0795cdeea7f9688993eb4021

    • SHA256

      a73bab6855e00d0624499d2254e92e737f6078ffe341608f5adc35795f10725c

    • SHA512

      c31fb2067ddeff6ecd4464a4e788889502a50b581fa053072354e1218fb84734f492ecd7b379ebf0e2a52eccea39234bdf3dd17d6e4125abc696e91e57cc05ff

    • SSDEEP

      98304:VR+nh2Yi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFF9hakrJ/U6V/:VsnLDOYjJlpZstQoS9Hf12VKXqbaCxV/

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks